Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Counterintelligence

Intro to Threat Hunting

If you’ve been around the information security community, you’ve probably heard the term “Threat …

Subscribe to the Blog

View All Posts

The Insider Threat: Why Your Greatest Security Risk Might Be Your Employees

If you’re outside the security industry, you probably think of a cybercriminal as they are portrayed on TV …

View

Best Practices for a Successful Vendor Onboarding Process

Author: Heather Stump Are you searching for a new partner to help protect your business from cyber threats? …

View

What is the Darknet?

Author: Jarrod Suffecool We all hear about the “Darknet” and the “Deepweb” all the time when referring to …

View

Are you in tune? Why SIEM tuning is important

Authors: Eric Itangata and Mike Daniels A Security Information and Event Manager (SIEM) is in the traditional sense, …

View

EmoCrash: Exploiting a Vulnerability in Emotet Malware for Defense

By: James Quinn Most of the vulnerabilities and exploits that you read about are good news for attackers …

View

Creating YARA Rules Based on Code

Author: Stephan Simon The first post of this two-part blog covered a simple introduction to YARA, simple rules …

View

Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.